On Threshold Editing

Total Page:16

File Type:pdf, Size:1020Kb

On Threshold Editing On Threshold Editing Bachelor Thesis of Matthias Schimek At the Department of Informatics Institute of Theoretical Informatics Reviewers: Prof. Dr. Dorothea Wagner Prof. Dr. Peter Sanders Advisor: Michael Hamann, M.Sc. Time Period: 15th June 2016 – 14th October 2016 KIT – University of the State of Baden-Wuerttemberg and National Laboratory of the Helmholtz Association www.kit.edu Statement of Authorship I hereby declare that this document has been composed by myself and describes my own work, unless otherwise acknowledged in the text. Karlsruhe, 10th October 2016 iii Abstract In this thesis we consider the problems threshold deletion and threshold editing on quasi-threshold graphs. Both problems ask to transform an input graph into a threshold graph using a minimal number of edge operations. In threshold deletion these are restricted to the deletion of edges only, whereas in threshold editing both the deletion and the insertion of edges are permitted. Threshold graphs are graphs that do not contain a P4, C4 or 2K2 as a vertex-induced subgraph. Both problems are NP-complete on general graphs. We focus on quasi-threshold graphs as input graphs, i.e. graphs that do not contain a P4 or C4 as a vertex-induced subgraph. For the problem of threshold deletion we will give an algorithm that needs O(|V | + |E|) time, where Q = (V, E) is the input graph. In the case of threshold editing we present an algorithm that needs exponential time in the size of the vertex set of the input graph. However, our evaluation shows that the running time of this algorithm is feasible for a set of randomly generated input graphs consisting of up to 300 vertices. Furthermore, we give a heuristic for this problem with a quadratic running time. Deutsche Zusammenfassung In dieser Arbeit werden die Probleme Threshold Deletion und Threshold Editing auf Quasi-Threshold-Graphen untersucht. Das Problem Threshold Deletion besteht darin, eine minimale Anzahl von Kanten des Eingabegraphen zu löschen, um diesen in einen Threshold-Graphen umzuwandeln. Für Threshold Editing dürfen nicht nur Kanten gelöscht, sondern auch Kanten hinzugefügt werden, um den Eingabegraphen in einen Threshold-Graphen zu überführen. Threshold-Graphen können durch verbotene Subgraphen charakterisiert werden. Es sind genau die Graphen, welche keinen P4, C4 oder 2K2 als knoteninduzierten Subgraphen enthalten. Auf allgemeinen Graphen sind beide Probleme NP-vollständig. Als Eingabegraphen werden in dieser Arbeit nur Quasi-Threshold-Graphen betrach- tet. Diese sind Graphen, die keinen P4 oder C4 als knoteninduzierten Subgraphen enthalten. Für Threshold Deletion wird ein Algorithmus vorgestellt, der das Problem in O(|V | + |E|) löst, wobei Q = (V, E) der Eingabegraph ist. Ebenso wird ein Algorithmus für das Problem Threshold Editing gegeben, dieser hat eine exponen- tielle Laufzeit in der Knotenanzahl des Eingabegraphen. Jedoch erweist sich der Algorithmus auf den zur Evaluation verwendeten zufällig generierten Graphen mit bis zu 300 Knoten als praktikabel. Weiterhin wird eine Heuristik für dieses Problem vorgestellt, deren Laufzeit quadratisch ist. v Contents 1 Introduction 1 2 Editing to Threshold Graphs 5 2.1 Quasi-Threshold Graphs . .5 2.2 Threshold Graphs . .6 2.3 Quasi-Threshold to Threshold Deletion . .7 2.4 Quasi-Threshold to Threshold Editing . 11 2.4.1 Properties of Nearest Threshold Graphs . 11 2.4.2 Exact Algorithm . 21 2.4.2.1 Enumerating-Algorithm . 22 2.4.2.2 Leaf-Positioning-Algorithm . 26 2.4.2.3 Running Time . 31 2.4.3 Heuristic . 31 3 Experimental Evaluation 35 3.1 Number of Edits . 36 3.2 Running Time . 37 3.3 Other Graphs . 38 4 Conclusion 41 Bibliography 43 vii 1. Introduction The main topics of this thesis are the graph modification problems threshold editing and threshold deletion. In general, a graph modification problem asks to transform an input graph G into a graph G0 with certain properties using a number of operations such as the insertion or deletion of vertices or edges. We denote by threshold editing the modification problem that only allows the insertion/deletion of edges in order to obtain a threshold graph from an input graph G. A threshold graph is a graph that does not contain P4, C4 or 2K2 as vertex-induced subgraphs (see Section 2.2 for further details and Figure 1.1 for an illustration). In the following, we define the problem more precisely: Threshold Editing Input: A graph G = (V, E) and k ∈ N. Problem: Is there a set F ⊆ V × V of size at most k such that G0 = (V, E∆F ) is a threshold graph? If the only modification allowed is the deletion of edges, the corresponding problem is called threshold deletion. Threshold Deletion Input: A graph G = (V, E) and k ∈ N. Problem: Is there a set F ⊆ E of size at most k such that G0 = (V, E\F ) is a threshold graph? The NP-completeness of threshold deletion is shown in [Mar94]. In [DDLS15], Drange et al. show that the same holds for threshold editing, even on split graphs. Those are graphs whose vertex sets can be partioned into a clique and an independent set [BLS99]. These graphs can also be characterized as the graph class that does not contain C4,C5 or 2K2 as vertex-induced subgraphs. Furthermore, they give algorithms√ solving threshold editing and threshold deletion for an input graph G = (V, E) in 2O( k log k)+ poly(|V |) time, where k is the parameter from the problem definitions. This shows in particular that threshold editing and threshold deletion are fixed-parameter tractable, i.e. their complexity can be described 1 1. Introduction (a) (b) (c) (d) Figure 1.1: P4 (a), C4 (b), C5 (c) and 2K2 (d). c by f(k) · |P | , where P is a problem instance, f : N → N, c ∈ N and k is a parameter of P . This result can be genearalized. In [Cai96], Cai shows that all graph modification problems are fixed-parameter tractable if the target graph class can be characterized by a finite set of forbidden subgraphs. In this thesis we will focus on threshold editing and threshold deletion with quasi-threshold graphs as our problem input, i.e. graphs that do not contain P4 or C4 as vertex-induced subgraphs. As threshold editing is NP-complete on split graphs, the question arises whether the same holds true for quasi-threshold graphs, whose set of forbidden subgraphs is related. Quasi-threshold graphs can be recognized in linear time [JHJJC96]. One of the applications of quasi-threshold graphs is in graph clustering. In [NG13] Nastos et al. present the following idea in order to find clusters in social networks: a graph G representing a social network is transformed into a nearest quasi-threshold graph Q, i.e. the editing distance from G to Q is minimal. The connected components of Q are viewed as clusters of G. In the field of bioinformatics, the approach of transforming an input graph to a set of disjoint cliques and interpreting these cliques as clusters is called cluster editing and widely discussed (see for instance [BB13]). One could adapt this concept for threshold graphs. Hence, theoretical considerations in this area might be of interest. Our contribution. In the case of threshold deletion, we give an algorithm that computes for any quasi-threshold graph Q = (V, E) a nearest threshold graph G0 = (V, E\F ), i.e. the set F has minimal size among all threshold graphs with vertex set V . The algorithm has O(|V | + |E|) complexity, whereas the problem is NP-complete on general graphs. Similarly for threshold editing we present an algorithm that computes a nearest threshold graph G0 = (V, E∆F ), i.e. F has minimal size among all threshold graphs with vertex set V . This algorithm needs O(2n(log n+1)+log n + |V | + |E|) time, where n is the number of vertices that are not leaves in a skeleton of the input graph (see Section 2.1 for details about the skeleton representation of quasi-threshold graphs). Our evaluation shows that its running time is feasible for a set of randomly generated graphs consisting of up to 300 vertices. This suggests that our algorithm can solve threshold editing for quasi-threshold graphs for which the use of the algorithm given in [DDLS15] would not be practical as the quasi-threshold graphs of this size that we examined in our evaluation required about 800 edits. The question whether threshold editing is NP-complete on quasi-threshold graphs remains open. Furthermore we give a heuristic for threshold editing. It is based on the Quasi-Threshold Mover given in [BHSW15], a heuristic for quasi-threshold editing. Additionally, we compare the exact algorithms for threshold deletion, threshold editing and the heuristic for threshold editing with respect to running time and to differences in the number of calculated edits. Preliminaries. Let G be a graph. We define VG as its vertex set and EG as its edge set. For a vertex v ∈ VG, by NG(v) we denote the neighbourhood of v, i.e. N(v) = {u | {u, v} ∈ EG}. 2 Further we define N¯ G(v) := NG(v) ∪ {v}. For a vertex v ∈ VG, the graph G − v is the subgraph of G induced by VG\{v}. The graph G + v, where v∈ / VG, has the same edge set as G and the vertex set VG ∪{v}. For a directed tree T and v ∈ VT , DepthT (v) denotes the depth of v in T . With LeavesT as the set of all leaves in T we define InnerT := VT \ LeavesT as the set of all ‘inner’ vertices, i.e. the vertices that are not leaves. For a vertex v, AncestorsT (v) shall be the set of all ancestors of v in T , i.e.
Recommended publications
  • On the Super Domination Number of Graphs
    On the super domination number of graphs Douglas J. Klein1, Juan A. Rodr´ıguez-Vel´azquez1,2, Eunjeong Yi1 1Texas A&M University at Galveston Foundational Sciences, Galveston, TX 77553, United States 2Universitat Rovira i Virgili, Departament d’Enginyeria Inform`atica i Matem`atiques Av. Pa¨ısos Catalans 26, 43007 Tarragona, Spain Email addresses: [email protected], [email protected],[email protected] April 24, 2018 Abstract The open neighbourhood of a vertex v of a graph G is the set N(v) consisting of all vertices adjacent to v in G. For D ⊆ V (G), we define D = V (G) \ D. A set D ⊆ V (G) is called a super dominating set of G if for every vertex u ∈ D, there exists v ∈ D such that N(v) ∩ D = {u}. The super domination number of G is the minimum cardinality among all super dominating sets in G. In this article, we obtain closed formulas and tight bounds for the super domination number of G in terms of several invariants of G. Furthermore, the particular cases of corona product graphs and Cartesian product graphs are considered. Keywords: Super domination number; Domination number; Cartesian product; Corona product. AMS Subject Classification numbers: 05C69; 05C70 ; 05C76 1 Introduction arXiv:1705.00928v2 [math.CO] 23 Apr 2018 The open neighbourhood of a vertex v of a graph G is the set N(v) consisting of all vertices adjacent to v in G. For D ⊆ V (G), we define D = V (G) \ D. A set D ⊆ V (G) is dominating in G if every vertex in D has at least one neighbour in D, i.e., N(u) ∩ D =6 ∅ for every u ∈ D.
    [Show full text]
  • Merging Peg Solitaire in Graphs
    Marquette University e-Publications@Marquette Mathematics, Statistics and Computer Science Mathematics, Statistics and Computer Science, Faculty Research and Publications Department of (-2019) 7-17-2017 Merging Peg Solitaire in Graphs John Engbers Marquette University, [email protected] Ryan Weber Marquette University Follow this and additional works at: https://epublications.marquette.edu/mscs_fac Part of the Computer Sciences Commons, Mathematics Commons, and the Statistics and Probability Commons Recommended Citation Engbers, John and Weber, Ryan, "Merging Peg Solitaire in Graphs" (2017). Mathematics, Statistics and Computer Science Faculty Research and Publications. 629. https://epublications.marquette.edu/mscs_fac/629 INVOLVE 11:1 (2018) :-msp dx.doi.org/10.2140/involve.2018.11.53 Merging peg solitaire on graphs John Engbers and Ryan Weber (Communicated by Anant Godbole) Peg solitaire has recently been generalized to graphs. Here, pegs start on all but one of the vertices in a graph. A move takes pegs on adjacent vertices x and y, with y also adjacent to a hole on vertex z, and jumps the peg on x over the peg on y to z, removing the peg on y. The goal of the game is to reduce the number of pegs to one. We introduce the game merging peg solitaire on graphs, where a move takes pegs on vertices x and z (with a hole on y) and merges them to a single peg on y. When can a confguration on a graph, consisting of pegs on all vertices but one, be reduced to a confguration with only a single peg? We give results for a number of graph classes, including stars, paths, cycles, complete bipartite graphs, and some caterpillars.
    [Show full text]
  • Decomposition of Wheel Graphs Into Stars, Cycles and Paths
    Malaya Journal of Matematik, Vol. 9, No. 1, 456-460, 2021 https://doi.org/10.26637/MJM0901/0076 Decomposition of wheel graphs into stars, cycles and paths M. Subbulakshmi1 and I. Valliammal2* Abstract Let G = (V;E) be a finite graph with n vertices. The Wheel graph Wn is a graph with vertex set fv0;v1;v2;:::;vng and edge-set consisting of all edges of the form vivi+1 and v0vi where 1 ≤ i ≤ n, the subscripts being reduced modulo n. Wheel graph of (n + 1) vertices denoted by Wn. Decomposition of Wheel graph denoted by D(Wn). A star with 3 edges is called a claw S3. In this paper, we show that any Wheel graph can be decomposed into following ways. 8 (n − 2d)S ; d = 1;2;3;::: if n ≡ 0 (mod 6) > 3 > >[(n − 2d) − 1]S3 and P3; d = 1;2;3::: if n ≡ 1 (mod 6) > <[(n − 2d) − 1]S3 and P2; d = 1;2;3;::: if n ≡ 2 (mod 6) D(Wn) = . (n − 2d)S and C ; d = 1;2;3;::: if n ≡ 3 (mod 6) > 3 3 > >(n − 2d)S3 and P3; d = 1;2;3::: if n ≡ 4 (mod 6) > :(n − 2d)S3 and P2; d = 1;2;3;::: if n ≡ 5 (mod 6) Keywords Wheel Graph, Decomposition, claw. AMS Subject Classification 05C70. 1Department of Mathematics, G.V.N. College, Kovilpatti, Thoothukudi-628502, Tamil Nadu, India. 2Department of Mathematics, Manonmaniam Sundaranar University, Tirunelveli-627012, Tamil Nadu, India. *Corresponding author: [email protected]; [email protected] Article History: Received 01 November 2020; Accepted 30 January 2021 c 2021 MJM.
    [Show full text]
  • Arxiv:2106.16130V1 [Math.CO] 30 Jun 2021 in the Special Case of Cyclohedra, and by Cardinal, Langerman and P´Erez-Lantero [5] in the Special Case of Tree Associahedra
    LAGOS 2021 Bounds on the Diameter of Graph Associahedra Jean Cardinal1;4 Universit´elibre de Bruxelles (ULB) Lionel Pournin2;4 Mario Valencia-Pabon3;4 LIPN, Universit´eSorbonne Paris Nord Abstract Graph associahedra are generalized permutohedra arising as special cases of nestohedra and hypergraphic polytopes. The graph associahedron of a graph G encodes the combinatorics of search trees on G, defined recursively by a root r together with search trees on each of the connected components of G − r. In particular, the skeleton of the graph associahedron is the rotation graph of those search trees. We investigate the diameter of graph associahedra as a function of some graph parameters. It is known that the diameter of the associahedra of paths of length n, the classical associahedra, is 2n − 6 for a large enough n. We give a tight bound of Θ(m) on the diameter of trivially perfect graph associahedra on m edges. We consider the maximum diameter of associahedra of graphs on n vertices and of given tree-depth, treewidth, or pathwidth, and give lower and upper bounds as a function of these parameters. Finally, we prove that the maximum diameter of associahedra of graphs of pathwidth two is Θ(n log n). Keywords: generalized permutohedra, graph associahedra, tree-depth, treewidth, pathwidth 1 Introduction The vertices and edges of a polyhedron form a graph whose diameter (often referred to as the diameter of the polyhedron for short) is related to a number of computational problems. For instance, the question of how large the diameter of a polyhedron arises naturally from the study of linear programming and the simplex algorithm (see, for instance [27] and references therein).
    [Show full text]
  • Coalition Graphs of Paths, Cycles, and Trees
    Discussiones Mathematicae Graph Theory xx (xxxx) 1–16 https://doi.org/10.7151/dmgt.2416 COALITION GRAPHS OF PATHS, CYCLES, AND TREES Teresa W. Haynes Department of Mathematics and Statistics East Tennessee State University Johnson City, TN 37604 e-mail: [email protected] Jason T. Hedetniemi Department of Mathematics Wilkes Honors College Florida Atlantic University Jupiter, FL 33458 e-mail: [email protected] Stephen T. Hedetniemi School of Computing Clemson University Clemson, SC 29634 e-mail: [email protected] Alice A. McRae and Raghuveer Mohan Computer Science Department Appalachian State University Boone, NC 28608 e-mail: [email protected] [email protected] Abstract A coalition in a graph G =(V,E) consists of two disjoint sets of vertices V1 and V2, neither of which is a dominating set of G but whose union V1 ∪V2 is a dominating set of G. A coalition partition in a graph G of order n = |V | 2 Haynes, Hedetniemi, Hedetniemi, McRae and Mohan is a vertex partition π = {V1,V2,...,Vk} of V such that every set Vi either is a dominating set consisting of a single vertex of degree n − 1, or is not a dominating set but forms a coalition with another set Vj which is not a dominating set. Associated with every coalition partition π of a graph G is a graph called the coalition graph of G with respect to π, denoted CG(G, π), the vertices of which correspond one-to-one with the sets V1,V2,...,Vk of π and two vertices are adjacent in CG(G, π) if and only if their corresponding sets in π form a coalition.
    [Show full text]
  • On the Threshold-Width of Graphs Maw-Shang Chang 1 Ling-Ju Hung 1 Ton Kloks Sheng-Lung Peng 2
    Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 15, no. 2, pp. 253–268 (2011) On the Threshold-Width of Graphs Maw-Shang Chang 1 Ling-Ju Hung 1 Ton Kloks Sheng-Lung Peng 2 1Department of Computer Science and Information Engineering National Chung Cheng University Min-Hsiung, Chia-Yi 621, Taiwan 2Department of Computer Science and Information Engineering National Dong Hwa University Shoufeng, Hualien 97401, Taiwan Abstract For a graph class G, a graph G has G-width k if there are k independent sets N1,..., Nk in G such that G can be embedded into a graph H ∈G such that for every edge e in H which is not an edge in G, there exists an i such that both endpoints of e are in Ni. For the class TH of threshold graphs we show that TH-width is NP-complete and we present fixed-parameter algorithms. We also show that for each k, graphs of TH-width at most k are characterized by a finite collection of forbidden induced subgraphs. Submitted: Reviewed: Revised: Accepted: September 2010 January 2011 March 2011 April 2011 Final: Published: May 2011 July 2011 Article type: Communicated by: Regular paper D. Wagner This research was supported by the National Science Council of Taiwan, under grants NSC 98– 2218–E–194–004 and NSC 98–2811–E–194–006. Ton Kloks is supported by the National Science Council of Taiwan, under grants the National Science Council of Taiwan, under grants NSC 99–2218–E–007–016 and NSC 99–2811–E–007–044.
    [Show full text]
  • The Classification of B-Perfect Graphs
    The classification of B-perfect graphs Stephan Dominique Andres Department of Mathematics and Computer Science, FernUniversit¨at in Hagen, Germany Key words: game chromatic number, game-perfectness, trivially perfect, graph colouring game 1 Introduction Consider the following game, played on an (initially uncolored) graph G = (V, E) with a color set C. The players, Alice and Bob, move alternately. A move consists in coloring a vertex v ∈ V with a color c ∈ C in such a way that adjacent vertices receive distinct colors. If this is not possible any more, the game ends. Alice wins if every vertex is colored in the end, otherwise Bob wins. This type of game was introduced by Bodlaender [2]. He considers a variant, which we will call game g, in which Alice must move first and passing is not allowed. In order to obtain upper and lower bounds for a parameter associated with game g, two other variants are useful. In the game B Bob may move first. He may also miss one or several turns, but Alice must always move. In the other variant, game A, Alice may move first and miss one or several turns, but Bob must move. So in game B Bob has some advantages, whereas in game A Alice has some advantages with respect to Bodlaender’s game. For any variant G∈{B,g,A}, the smallest cardinality of a color set C, so that Alice has a winning strategy for the game G is called G-game chromatic number χG(G) of G. Email address: [email protected] (Stephan Dominique Andres).
    [Show full text]
  • A Characterization of General Position Sets in Graphs
    A characterization of general position sets in graphs Bijo S. Anand a Ullas Chandran S. V. b Manoj Changat c Sandi Klavˇzar d;e;f Elias John Thomas g November 16, 2018 a Department of Mathematics, Sree Narayana College, Punalur-691305, Kerala, India; bijos [email protected] b Department of Mathematics, Mahatma Gandhi College, Kesavadasapuram, Thiruvananthapuram-695004, Kerala, India; [email protected] c Department of Futures Studies, University of Kerala Thiruvananthapuram-695034, Kerala, India; [email protected] d Faculty of Mathematics and Physics, University of Ljubljana, Slovenia [email protected] e Faculty of Natural Sciences and Mathematics, University of Maribor, Slovenia f Institute of Mathematics, Physics and Mechanics, Ljubljana, Slovenia g Department of Mathematics, Mar Ivanios College, Thiruvananthapuram-695015, Kerala, India; [email protected] Abstract A vertex subset S of a graph G is a general position set of G if no vertex of S lies on a geodesic between two other vertices of S. The cardinality of a largest general position set of G is the general position number gp(G) of G. It is proved that S ⊆ V (G) is a general position set if and only if the components of G[S] are complete subgraphs, the vertices of which form an in-transitive, distance-constant partition of S. If diam(G) = 2, then gp(G) is the maximum of the clique number of G and the maximum order of an induced complete multipartite subgraph of the complement of G. As a consequence, gp(G) of a cograph G can be determined in polynomial time.
    [Show full text]
  • On Retracts, Absolute Retracts, and Folds In
    ON RETRACTS,ABSOLUTE RETRACTS, AND FOLDS IN COGRAPHS Ton Kloks1 and Yue-Li Wang2 1 Department of Computer Science National Tsing Hua University, Taiwan [email protected] 2 Department of Information Management National Taiwan University of Science and Technology [email protected] Abstract. Let G and H be two cographs. We show that the problem to determine whether H is a retract of G is NP-complete. We show that this problem is fixed-parameter tractable when parameterized by the size of H. When restricted to the class of threshold graphs or to the class of trivially perfect graphs, the problem becomes tractable in polynomial time. The problem is also solvable in linear time when one cograph is given as an in- duced subgraph of the other. We characterize absolute retracts for the class of cographs. Foldings generalize retractions. We show that the problem to fold a trivially perfect graph onto a largest possible clique is NP-complete. For a threshold graph this folding number equals its chromatic number and achromatic number. 1 Introduction Graph homomorphisms have regained a lot of interest by the recent characteri- zation of Grohe of the classes of graphs for which Hom(G, -) is tractable [11]. To be precise, Grohe proves that, unless FPT = W[1], deciding whether there is a homomorphism from a graph G 2 G to some arbitrary graph H is polynomial if and only if the graphs in G have bounded treewidth modulo homomorphic equiv- alence. The treewidth of a graph modulo homomorphic equivalence is defined as the treewidth of its core, ie, a minimal retract.
    [Show full text]
  • Graph Theory in the Analysis of Arithmophobia
    International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-12, October 2019 Graph Theory in the Analysis of Arithmophobia A. Uma Maheswari, A.S.Purnalakshimi Abstract: In this paper, Graph theoretical concepts are applied 2. Dizziness to analyze the reasons behind Arithmophobia commonly found 3. Excessive sweating . among the students.Bull graph is used to epitomize Mild 4. Palpitation Arithmophobia which occurs when the preparation of students to 5. Inability to think clearly face any test is deficient.Flower graph is used to represent Intense 6. Sensational detachment from reality Arithmophobia. Wheel graph is used to depict the factors which desensitize Arithmophobia. Inferring information from these 7. Passive behavior types of graphs is much more easier than inferring from a self 8. Unwillingness to try map. This analysis will help in treating Arithmophobia and 9. Chest pain in very rare cases improve the student’s performance in Mathematics progressively. 10. A fully blown anxiety attack The benefits of using interactive graphical interface, graphs and graph theory metrics for a client centered analysis is also C. Analytical Process Flow discussed. A questionnaire with 12 simple questions were Keywords : Phobia, Arithmophobia, Desensitize. prepared and survey was taken from nearly 120 students.The questionnaire was prepared keeping in mind the causes of I. INTRODUCTION Arithmophobia mentioned above.The fact that is inferred from the survey that 98% of the students have Arithmophobia Graph theory originated ,way back in 1736 is one of the most is appalling. As kids the students are interested in interesting branches of Mathematics and serves as a tool to mathematics since it deals with only four operations uncover the nature of physical reality .Graphs are used to (addition, subtraction, multiplication and division )and is model many types of relationships, physical,biological quite different from their other theory subjects.
    [Show full text]
  • Linear Separation of Connected Dominating Sets in Graphs∗
    ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 487–525 https://doi.org/10.26493/1855-3974.1330.916 (Also available at http://amc-journal.eu) Linear separation of connected dominating sets in graphs∗ Nina Chiarelli y, Martin Milanicˇ z University of Primorska, UP FAMNIT, Glagoljaskaˇ 8, SI-6000 Koper, Slovenia University of Primorska, UP IAM, Muzejski trg 2, SI-6000 Koper, Slovenia Received 21 February 2017, accepted 12 November 2018, published online 15 March 2019 Abstract A connected dominating set in a graph is a dominating set of vertices that induces a connected subgraph. Following analogous studies in the literature related to independent sets, dominating sets, and total dominating sets, we study in this paper the class of graphs in which the connected dominating sets can be separated from the other vertex subsets by a linear weight function. More precisely, we say that a graph is connected-domishold if it admits non-negative real weights associated to its vertices such that a set of vertices is a connected dominating set if and only if the sum of the corresponding weights exceeds a certain threshold. We characterize the graphs in this non-hereditary class in terms of a property of the set of minimal cutsets of the graph. We give several char- acterizations for the hereditary case, that is, when each connected induced subgraph is required to be connected-domishold. The characterization by forbidden induced subgraphs implies that the class properly generalizes two well known classes of chordal graphs, the block graphs and the trivially perfect graphs.
    [Show full text]
  • On the Threshold of Intractability
    On the Threshold of Intractability P˚alGrøn˚asDrange∗ Markus Sortland Dregi∗ Daniel Lokshtanov∗ Blair D. Sullivany May 4, 2015 Abstract We study the computational complexity of the graph modification problems Threshold Editing and Chain Editing, adding and deleting as few edges as possible to transform the input into a threshold (or chain) graph. In this article, we show that both problems are NP-hard, resolving a conjecture by Natanzon, Shamir, and Sharan (Discrete Applied Mathematics, 113(1):109{128, 2001). On the positive side, we show the problem admits a quadratic vertex kernel. Furthermore,p we give a subexponential time parameterized algorithm solving Threshold Editing in 2O( k log k) + poly(n) time, making it one of relatively few natural problems in this complexity class on general graphs. These results are of broader interest to the field of social network analysis, where recent work of Brandes (ISAAC, 2014) posits that the minimum edit distance to a threshold graph gives a good measure of consistency for node centralities. Finally, we show that all our positive results extend to the related problem of Chain Editing, as well as the completion and deletion variants of both problems. 1 Introduction In this paper we study the computational complexity of two edge modification problems, namely editing to threshold graphs and editing to chain graphs. Graph modification problems ask whether a given graph G can be transformed to have a certain property using a small number of edits (such as deleting/adding vertices or edges), and have been the subject of significant previous work [29,7,8,9, 25].
    [Show full text]